{"id":49547,"date":"2016-10-26T00:00:00","date_gmt":"2016-10-26T00:00:00","guid":{"rendered":"https:\/\/www.techopedia.com\/how-big-data-can-secure-user-authentication\/"},"modified":"2017-04-17T17:43:17","modified_gmt":"2017-04-17T17:43:17","slug":"how-big-data-can-secure-user-authentication","status":"publish","type":"post","link":"https:\/\/www.techopedia.com\/2\/31957\/trends\/big-data\/how-big-data-can-secure-user-authentication","title":{"rendered":"How Big Data Can Secure User Authentication"},"content":{"rendered":"

Password<\/a>-based as well as two-factor<\/a> and multi-factor authentication<\/a> processes have not been able to provide protection to systems and data as well as was expected due to various reasons. Password-based authentication<\/a> is too weak, and two-factor and multi-factor authentication processes have been rejected by users because of poor user experience<\/a>.\n<\/p>\n

Big-data<\/a>-based authentication systems promise to offer both robust authentication and a good user experience. Unlike other authentication systems, big-data-based authentication authenticates a user based on multidimensional and regularly updatable information collected about the user. The main difference between big-data-based authentication and other processes is that the former uses multidimensional information to authenticate a user. Multiple such products are already available on the market, and they are becoming popular. However, other systems have not been consigned to oblivion just yet due to various reasons. (To learn more about security methods, see What Enterprise Needs to Know About Identity and Access Management (IAM)<\/a>.)\n<\/p>\n

Current Trends in User Authentication<\/span><\/h2>\n

In the user authentication domain now, the traditional systems such as password-based systems are still being used, while novel methods such as big-data-based authentication are emerging. Traditional systems, for all their problems, are still being used because of lesser acceptance of stronger authentication systems and integration issues with newer models. Some of the main trends in this domain are described below:\n<\/p>\n